FRATERNiTY
Thursday, 30 June 2011
Posted by
Pprasoon
at
19:23
3
comments
Change the icons of your drive vd ur image
Tuesday, 28 June 2011
HERE IS THE VIDEO ::: Video tutorial
Posted by
Pprasoon
at
22:38
0
comments
Countermeasures for keyloggers
Sunday, 26 June 2011
Posted by
Pprasoon
at
10:23
0
comments
how to make a folder without name & hidden folder without hiding it
Thursday, 23 June 2011
Labels:
Secrets Finally Revealed
Posted by
Pprasoon
at
09:49
0
comments
CounterMeasures for IP ADDRESS
Monday, 20 June 2011
Since these numbers are usually assigned to internet service providers within region-based blocks, an IP address can often be used to identify the region or country from which a computer is connecting to the Internet. An IP address can sometimes be used to show the user's general location.
ok let get to know the ip address in a layman and very simple way ::
IP address is like a phone no. or the house no. When you have to talk to person you dial his no. in same way when you connect to internet you get a no., from which people connects to you and talk to you that no. which connect to you in internet is known as IP address.
If a person what to share a book, he takes your address now that address is know as your identity in same way is person want to share something about on internet then it uses your IP address .
In the world of internet, ip address is your identification
HOW IP ADDRESS HELPS IN HACKING
1) It helps to connect to your computer and then helps in entering in to your computer
2) If person knows your ip address then remote shutdown (means your computer can be shutdown) by the person
3) Virus can be uploaded to your computer and you will not get to know
4) Sensitive data can be hacked and can to be transferred form your computer to another or person itself
5) Blues Port Scanner – This program will scan the IP address that you chose and identify open ports that are on the target box.
6) Your ip address can be used for ip spoofing and with your ip hacking can be made and when ip is trace you will be the witness or theaf
HOW TO KNOW YOUR IP ADDRESS
1) Open your run command (by pressing window key + r) then type cmd
a command prompt window will open and type ipconfig (press enter)
2) Or go to this website :: http://whatismyipaddress.com/
The most common method to protect your IP address is to use a proxy server in one form or another.
WHAT IS PROXY SERVER
A proxy server is a computer that offers a computer network service to allow clients to make indirect network connections to other network services. A client connects to the proxy server and then requests a connection, file, or other resource available on a different server. The proxy provides the resource either by connecting to the specified server or by serving it from a cache. In some cases, the proxy may alter the client's request or the server's response for various purposes.
Basically proxy server is masking or hiding your identity behind the fake id
To keep machines behind it anonymous (mainly for security)
Software or uses proxy servers to Protect your IP address ::
Ultrasurf is the software which protects your ip and even provide you proxy server
Hide IP Platinum Next Gene v1.52 Download => Hide IP Platinum crack + serial key
super hide ip download => Super hide ip crack + serial key
There Some proxy servers that helps to protect your ip address ::
1) http://www.bestproxysites.com/
2) http://www.proxysites.com
3) http://newipnow.com/
4)http://www.antiwebfilter.com/web-proxies/ good one
5) http://surfmo.com/
There are many more just ask the google baba........
Labels:
Hacking Secrets Finally Revealed
Posted by
Pprasoon
at
09:19
0
comments
SHUTDOWN and RESTART your computer in 5 different ways
Sunday, 19 June 2011
download the exe file => exe file shutdown
exe file restart
HIBERNATE YOUR COMPUTER AT ONE CLICK ::
Download the file => exe file of hibernate
But first you have to enable the hibernate :: go to control panel then to power option and then to the hibernate option check the enable hibernate then click ok here you go
you may hibernate buy opening the shutdown window press ctrl button the stand by will change to hibernate
Labels:
Secrets Finally Revealed
Posted by
Pprasoon
at
11:29
0
comments
HOW TO MAKE VIRUS AND TRICKS WITH NOTEPAD
Friday, 17 June 2011
***********************
Make BACKDOOR HELP of BACKTRACK TERMINAL => Click on me :))
Hack Wifi => Click on me :)
Crack hash passwords => Click on me :)
Keep safe ur wifi from being hacked => 1_Click on me:)
2_Click on me:)
**************************************
******************
NMAP TUTORIAL Backtrack => Click on me :)
Different ways to DOS ATTACKS => Click on me :)
Fun with Konsole or Terminal => Click on me :)
**********************************
©Pprasoon nigam
********************
METASPLOIT basics => Metasploit Basics Click on me :)
Know how metasploit meterpreter Woks => learn meterpreter
Use NMAP in metasploit => NMAP in METASPLOIT click on me :)
G-mail two way verification => Click on me :)
Bluetooth shocking Trick => Click on me :)
****************************************
*********************(~_^)********************
Hack WIFI with the help of GUI version in Backtrack => Click on me :))
Labels:
Secrets Finally Revealed
Posted by
Pprasoon
at
00:00
8
comments
CounterMeasures for notepad virus and .bat virus
Wednesday, 15 June 2011
Here's The Secret
To make registry file with .reg extension
Labels:
Secrets Finally Revealed
Posted by
Pprasoon
at
19:41
0
comments
Countermeasures for System hacking
Thursday, 9 June 2011
Types of passwords :
Password that contain only letters :: HJKL
Password that contain only numbers :: 2545
Password that contain only special characters :: $#%^
Password that contain letters and numbers :: jdsh563
Password that contain only letters and special characters :: js$#ZD
Password that contain only special characters :: ^#%456$
Password that contain letters special characters and numbers :: E$f$56
There four types of password attacks ::
- Passive online attacks
- Active online attacks
- Offline attacks
- Non-electronic attacks
Passive online attack :
Wire Sniffing
- Access and record the raw network traffic
- Wait until the authentication sequence
- Brute force credentials
Man in the middle
- Somehow get access to the communications channel
- Wait until the authentication sequence
- No need to brute force
Active online attack ::
Password Guessing
- Try different password until one works
- Bad password
- Open authentication points
Offline attacks ::
- Offline attacks are time
- Web services are available
- Distributed password cracking techniques are available
Tools for Attacks ::
NAT :: NetBIOS Auditing TOOL
BFT :: Brute Force Tool
:: KerbCrack
Password Sniffing ::
- Password guessing is a tough task
- If an attacker is able to eavesdrop on NT/2000 logins, then this approach can spare lot of random guesswork
Password Cracking Tools::
- Access PassView
- Crack
- LCP
- Keyloggers
Countermeasures for Password Hacking
How to keep STRONG PASSWORD :: Try to use full keyboard means use alphabets, numbers and characters :: Use capital letters too :: for example P.r.#.a.S.O.$.o.n
Changer your password :: Change your password every after 10 days of 15 days :: This will more good for you to be safe and try to keep strong password ::
Use different passwords for different accounts. Everybody knows this but nobody cares to follow this. I know remembering a dozen cryptic passwords is very difficult but still I will suggest you to use different passwords for the accounts having sensitive informations.
Check your Security Question. Usually people keep some cryptic password but their security question is too simple to guess. For example, many people keep the security question as the name of their pet or first school
Threats and Countermeasures
Threat Countermeasures
Spoofing user identity Use strong authentication.
Do not store secrets (for example, passwords) in plaintext.
Do not pass credentials in plaintext over the wire.
Protect authentication cookies with Secure Sockets Layer (SSL).
Tampering with data Use data hashing and signing.
Use digital signatures.
Use strong authorization.
Use tamper-resistant protocols across communication links.
Secure communication links with protocols that provide message integrity.
Repudiation Create secure audit trails.
Use digital signatures.
Information disclosure Use strong authorization.
Use strong encryption.
Secure communication links with protocols that provide message confidentiality.
Do not store secrets (for example, passwords) in plaintext.
Labels:
Hacking Secrets Finally Revealed
Posted by
Pprasoon
at
22:40
0
comments
Types of Viruses
The different types of viruses are as follows-
1) Boot Sector Virus :- Boot sector viruses infect either the master boot record of the hard disk or the floppy drive. The boot record program responsible for the booting of operating system is replaced by the virus. The virus either copies the master boot program to another part of the hard disk or overwrites it. They infect a computer when it boots up or when it accesses the infected floppy disk in the floppy drive. i.e. Once a system is infected with a boot-sector virus, any non-write-protected disk accessed by this system will become infected.
Examples of boot- sector viruses are Michelangelo and Stoned.
2) File or Program Viruses :- Some files/programs, when executed, load the virus in the memory and perform predefined functions to infect the system. They infect program files with extensions like .EXE, .COM, .BIN, .DRV and .SYS .
Some common file viruses are Sunday, Cascade.
3) Multipartite Viruses :- A multipartite virus is a computer virus that infects multiple different target platforms, and remains recursively infective in each target. It attempts to attack both the boot sector and the executable, or programs, files at the same time. When the virus attaches to the boot sector, it will in turn affect the system’s files, and when the virus attaches to the files, it will in turn infect the boot sector.
This type of virus can re-infect a system over and over again if all parts of the virus are not eradicated.
Ghostball was the first multipartite virus, discovered by Fridrik Skulason in October 1989.
Other examples are Invader, Flip, etc.
4) Stealth Viruses :- These viruses are stealthy in nature means it uses various methods for hiding themselves to avoid detection. They sometimes remove themselves from the memory temporarily to avoid detection by antivirus. They are somewhat difficult to detect. When an antivirus program tries to detect the virus, the stealth virus feeds the antivirus program a clean image of the file or boot sector.
5) Polymorphic Viruses :- Polymorphic viruses have the ability to mutate implying that they change the viral code known as the signature each time they spread or infect. Thus an antivirus program which is scanning for specific virus codes unable to detect it's presense.
6) Macro Viruses :- A macro virus is a computer virus that "infects" a Microsoft Word or similar application and causes a sequence of actions to be performed automatically when the application is started or something else triggers it. Macro viruses tend to be surprising but relatively harmless.A macro virus is often spread as an e-mail virus. Well-known examples are Concept Virus and Melissa Worm.
Labels:
Secrets Finally Revealed
Posted by
Pprasoon
at
09:24
0
comments
Calculations On Command Prompt
the command processor CMD.EXE comes with a mini-calculator that can perform simple arithmetic on 32-bit signed integers:
C:\>set /a 2+2
4
C:\>set /a 2*(9/2)
8
C:\>set /a (2*9)/2
9
C:\>set /a "31>>2"
7
Note that we had to quote the shift operator since it would otherwise be misinterpreted as a "redirect stdout and append" operator.
For more information, type set /? at the command prompt.
Labels:
Secrets Finally Revealed
Posted by
Pprasoon
at
09:18
0
comments
Different Error Codes
400 = This is bad request error, First check you may be typing wrong URL name and server could not understand your request.
401 = You are trying to open any unauthorized access site or page. Check your username and password if you are trying to open any webpage.
402 = Payment Required Error
403 = You are trying to open any forbidden page and you are blocked by that domain.
404 = Here you are trying to open the webpage that was removed or re-named, also check the URL spelling.
408 = This is time out error. you should send the request with in time that the server set for you.
Labels:
Secrets Finally Revealed
Posted by
Pprasoon
at
07:26
2
comments
10 reasons why PCs crash U must Know
Wednesday, 8 June 2011
Fatal error: the system has become unstable or is busy," it says. "Enter to return to Windows or press Control-Alt-Delete to restart your computer. If you do this you will lose any unsaved information in all open applications."
You have just been struck by the Blue Screen of Death. Anyone who uses Mcft Windows will be familiar with this. What can you do? More importantly, how can you prevent it happening?
Hardware conflict
The number one reason why Windows crashes is hardware conflict. Each hardware device communicates to other devices through an interrupt request channel (IRQ). These are supposed to be unique for each device.
For example, a printer usually connects internally on IRQ 7. The keyboard usually uses IRQ 1 and the floppy disk drive IRQ 6. Each device will try to hog a single IRQ for itself.
If there are a lot of devices, or if they are not installed properly, two of them may end up sharing the same IRQ number. When the user tries to use both devices at the same time, a crash can happen. The way to check if your computer has a hardware conflict is through the following route:
* Start-Settings-Control Panel-System-Device Manager.
Often if a device has a problem a yellow '!' appears next to its description in the Device Manager. Highlight Computer (in the Device Manager) and press Properties to see the IRQ numbers used by your computer. If the IRQ number appears twice, two devices may be using it.
Sometimes a device might share an IRQ with something described as 'IRQ holder for PCI steering'. This can be ignored. The best way to fix this problem is to remove the problem device and reinstall it.
Sometimes you may have to find more recent drivers on the internet to make the device function properly. A good resource is www.driverguide.com. If the device is a soundcard, or a modem, it can often be fixed by moving it to a different slot on the motherboard (be careful about opening your computer, as you may void the warranty).
When working inside a computer you should switch it off, unplug the mains lead and touch an unpainted metal surface to discharge any static electricity.
To be fair to Mcft, the problem with IRQ numbers is not of its making. It is a legacy problem going back to the first PC designs using the IBM 8086 chip. Initially there were only eight IRQs. Today there are 16 IRQs in a PC. It is easy to run out of them. There are plans to increase the number of IRQs in future designs.
Bad Ram
Ram (random-access memory) problems might bring on the blue screen of death with a message saying Fatal Exception Error. A fatal error indicates a serious hardware problem. Sometimes it may mean a part is damaged and will need replacing.
But a fatal error caused by Ram might be caused by a mismatch of chips. For example, mixing 70-nanosecond (70ns) Ram with 60ns Ram will usually force the computer to run all the Ram at the slower speed. This will often crash the machine if the Ram is overworked.
One way around this problem is to enter the BIOS settings and increase the wait state of the Ram. This can make it more stable. Another way to troubleshoot a suspected Ram problem is to rearrange the Ram chips on the motherboard, or take some of them out. Then try to repeat the circumstances that caused the crash. When handling Ram try not to touch the gold connections, as they can be easily damaged.
Parity error messages also refer to Ram. Modern Ram chips are either parity (ECC) or non parity (non-ECC). It is best not to mix the two types, as this can be a cause of trouble.
EMM386 error messages refer to memory problems but may not be connected to bad Ram. This may be due to free memory problems often linked to old Dos-based programmes.
BIOS settings
Every motherboard is supplied with a range of chipset settings that are decided in the factory. A common way to access these settings is to press the F2 or delete button during the first few seconds of a boot-up.
Once inside the BIOS, great care should be taken. It is a good idea to write down on a piece of paper all the settings that appear on the screen. That way, if you change something and the computer becomes more unstable, you will know what settings to revert to.
A common BIOS error concerns the CAS latency. This refers to the Ram. Older EDO (extended data out) Ram has a CAS latency of 3. Newer SDRam has a CAS latency of 2. Setting the wrong figure can cause the Ram to lock up and freeze the computer's display.
Mcft Windows is better at allocating IRQ numbers than any BIOS. If possible set the IRQ numbers to Auto in the BIOS. This will allow Windows to allocate the IRQ numbers (make sure the BIOS setting for Plug and Play OS is switched to 'yes' to allow Windows to do this.).
Hard disk drives
After a few weeks, the information on a hard disk drive starts to become piecemeal or fragmented. It is a good idea to defragment the hard disk every week or so, to prevent the disk from causing a screen freeze. Go to
* Start-Programs-Accessories-System Tools-Disk Defragmenter
This will start the procedure. You will be unable to write data to the hard drive (to save it) while the disk is defragmenting, so it is a good idea to schedule the procedure for a period of inactivity using the Task Scheduler.
The Task Scheduler should be one of the small icons on the bottom right of the Windows opening page (the desktop).
Some lockups and screen freezes caused by hard disk problems can be solved by reducing the read-ahead optimisation. This can be adjusted by going to
* Start-Settings-Control Panel-System Icon-Performance-File System-Hard Disk.
Hard disks will slow down and crash if they are too full. Do some housekeeping on your hard drive every few months and free some space on it. Open the Windows folder on the C drive and find the Temporary Internet Files folder. Deleting the contents (not the folder) can free a lot of space.
Empty the Recycle Bin every week to free more space. Hard disk drives should be scanned every week for errors or bad sectors. Go to
* Start-Programs-Accessories-System Tools-ScanDisk
Otherwise assign the Task Scheduler to perform this operation at night when the computer is not in use.
Fatal OE exceptions and VXD errors
Fatal OE exception errors and VXD errors are often caused by video card problems.
These can often be resolved easily by reducing the resolution of the video display. Go to
* Start-Settings-Control Panel-Display-Settings
Here you should slide the screen area bar to the left. Take a look at the colour settings on the left of that window. For most desktops, high colour 16-bit depth is adequate.
If the screen freezes or you experience system lockups it might be due to the video card. Make sure it does not have a hardware conflict. Go to
* Start-Settings-Control Panel-System-Device Manager
Here, select the + beside Display Adapter. A line of text describing your video card should appear. Select it (make it blue) and press properties. Then select Resources and select each line in the window. Look for a message that says No Conflicts.
If you have video card hardware conflict, you will see it here. Be careful at this point and make a note of everything you do in case you make things worse.
The way to resolve a hardware conflict is to uncheck the Use Automatic Settings box and hit the Change Settings button. You are searching for a setting that will display a No Conflicts message.
Another useful way to resolve video problems is to go to
* Start-Settings-Control Panel-System-Performance-Graphics
Here you should move the Hardware Acceleration slider to the left. As ever, the most common cause of problems relating to graphics cards is old or faulty drivers (a driver is a small piece of software used by a computer to communicate with a device).
Look up your video card's manufacturer on the internet and search for the most recent drivers for it.
Viruses
Often the first sign of a virus infection is instability. Some viruses erase the boot sector of a hard drive, making it impossible to start. This is why it is a good idea to create a Windows start-up disk. Go to
* Start-Settings-Control Panel-Add/Remove Programs
Here, look for the Start Up Disk tab. Virus protection requires constant vigilance.
A virus scanner requires a list of virus signatures in order to be able to identify viruses. These signatures are stored in a DAT file. DAT files should be updated weekly from the website of your antivirus software manufacturer.
An excellent antivirus programme is McAfee VirusScan by Network Associates ( www.nai.com). Another is Norton AntiVirus 2000, made by Symantec ( www.symantec.com).
Printers
The action of sending a document to print creates a bigger file, often called a postscript file.
Printers have only a small amount of memory, called a buffer. This can be easily overloaded. Printing a document also uses a considerable amount of CPU power. This will also slow down the computer's performance.
If the printer is trying to print unusual characters, these might not be recognised, and can crash the computer. Sometimes printers will not recover from a crash because of confusion in the buffer. A good way to clear the buffer is to unplug the printer for ten seconds. Booting up from a powerless state, also called a cold boot, will restore the printer's default settings and you may be able to carry on.
8 Software
A common cause of computer crash is faulty or badly-installed software. Often the problem can be cured by uninstalling the software and then reinstalling it. Use Norton Uninstall or Uninstall Shield to remove an application from your system properly. This will also remove references to the programme in the System Registry and leaves the way clear for a completely fresh copy.
The System Registry can be corrupted by old references to obsolete software that you thought was uninstalled. Use Reg Cleaner to clean up the System Registry and remove obsolete entries. It works on Windows 95, Windows 98, Windows 98 SE (Second Edition), Windows Millennium Edition (ME), NT4 and Windows 2000.
Read the instructions and use it carefully so you don't do permanent damage to the Registry. If the Registry is damaged you will have to reinstall your operating system.
Often a Windows problem can be resolved by entering Safe Mode. This can be done during start-up. When you see the message "Starting Windows" press F4. This should take you into Safe Mode.
Safe Mode loads a minimum of drivers. It allows you to find and fix problems that prevent Windows from loading properly.
Sometimes installing Windows is difficult because of unsuitable BIOS settings. If you keep getting SUWIN error messages (Windows setup) during the Windows installation, then try entering the BIOS and disabling the CPU internal cache. Try to disable the Level 2 (L2) cache if that doesn't work.
Remember to restore all the BIOS settings back to their former settings following installation.
Overheating
Central processing units (CPUs) are usually equipped with fans to keep them cool. If the fan fails or if the CPU gets old it may start to overheat and generate a particular kind of error called a kernel error. This is a common problem in chips that have been overclocked to operate at higher speeds than they are supposed to.
One remedy is to get a bigger better fan and install it on top of the CPU. Specialist cooling fans/heatsinks are available from www.computernerd.com or www.coolit.com
CPU problems can often be fixed by disabling the CPU internal cache in the BIOS. This will make the machine run more slowly, but it should also be more stable.
Power supply problems
With all the new construction going on around the country the steady supply of electricity has become disrupted. A power surge or spike can crash a computer as easily as a power cut.
If this has become a nuisance for you then consider buying a uninterrupted power supply (UPS). This will give you a clean power supply when there is electricity, and it will give you a few minutes to perform a controlled shutdown in case of a power cut.
It is a good investment if your data are critical, because a power cut will cause any unsaved data to be lost.
Labels:
Secrets Finally Revealed
Posted by
Pprasoon
at
19:29
0
comments
Format drive with cmd
* Goto Start => Run.
* Type Cmd & press Enter.
* Type the following command line
Format/x G:
Labels:
Hacking Secrets Finally Revealed
Posted by
Pprasoon
at
18:49
0
comments
Mouse wheel tricks
If you have a mouse with a scroll wheel on it, you can do some cool tricks.......
1.Shift & Spin ::
What happens when you hold down the Shift key on a web page and spin the wheel on your wheel mouse? Explorer goes either back or forward, depending on which direction you spin.
Give it a try. Open up Internet Explorer(or any other browser) and follow a few links. Then, hold down your SHIFT key and spin that wheel.
2.CTRL & Spin ::
If you are in a web browser (Explorer or Netscape or Firefox) , hold down your Ctrl key and spin the wheel. It makes the text larger or smaller depending on which way you spin. For Opera users, it magnifies both the images and the text.
Labels:
Hacking Secrets Finally Revealed
Posted by
Pprasoon
at
18:37
0
comments
How to disable Low Disk Space Warning in Windows?
First of All open Registry Editor (Start > Run > and type regedit).
* Make a back up of the registry.
* Go the key:
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
* Right click in the right part of the window and select New and scroll to DWORD value.
* Name the value as NoLowDiskSpaceChecks
* Put 1 in the data field.
* From there it should be OK.
From Now on no pop up of low disk space can annoy you and if once again you would like to have this utility on Just change the NoLowDiskSpaceChecks DWORD value to 0.
Labels:
Hacking Secrets Finally Revealed
Posted by
Pprasoon
at
18:33
0
comments
The First Kiss
1. You don't want them to think you're more interested in kissing than you are interested in them.
2. You don't want them to think you like them a ton more than they like you, or they'll get scared
If they reciprocate your other physical gestures, such as holding hands, putting your arm around them, etc., then you can kiss them. However, don't kiss them immediately after you hold hands the first time! Do those other things for a few days to let the tension build until they are dying for you to kiss them!
The second biggest way you can blow a first kiss is to wait forever and miss too many opportunities. While it's good to let them wonder when you're going to do it (you want them to know you have confidence and are in control of yourself and the situation), if you wait for weeks and weeks and pass up too many opportunities, they're just going to move on.
Another thing: don't talk about it before you do it! Nothing ruins romance more than talking it to death before it happens! Let the attraction build, be calm and confident, and just kiss them when the moment presents itself. You don't have to put on a big production or arrange some fancy or romantic date or event in order to kiss them. Kiss them for the first time when you are by yourselves--spontaneously!
One more thing! Don't buy their affection! Don't think that you can take a girl out to dinner and she owes you a kiss. Girls see through that and it doesn't work! Girls, don't think you can get a guy to kiss you or be interested in you by buying them things or bringing them cookies. It's not like that!
Kissing Do's and Don'ts
Do's:
• Breathe! Breathe through your nose or don't be afraid to pull back slightly to take a breath, but no one likes it when their partner violently gasps because they've been holding their breath!
• Have fresh breath!
• Reciprocate their kissing and be active. You don't want to be a kissing post, you want to be a kisser!
• Be gentle, not violent!
• Use your hands.
• Pay attention to your partner. Kissing is not all about you--it's about making them feel good too!
Don'ts:
• Use too much tongue or a really stiff tongue. This can be a turn off. Try to be subtle and gentle. The slower the hotter!
• Lick their teeth. Yuck.
• Kiss with your eyes open. It's ok to peek once in a while, but keep em closed or you'll come off as creepy!
• Salivate everywhere. Slobbery kissing is not cool. Just be conscious of it, and you'll do fine.
• Move too fast. Stay in control of yourself and don't freak them out by getting too frisky!
Labels:
Emotins,
Feelings and Love
Posted by
Pprasoon
at
04:43
0
comments
Reveal *****(Asterisk) Passwords Using Javascript
Tuesday, 7 June 2011
Want to Reveal the Passwords Hidden Behind Asterisk (****) ?
Follow the steps given below-
1) Open the Login Page of any website. (eg. http://mail.yahoo.com)
2) Type your 'Username' and 'Password'.
3) Copy and paste the JavaScript code given below into your browser's address bar and press 'Enter'.
javascript: alert(document.getElementById('Passwd').value);
4) As soon as you press 'Enter', A window pops up showing Password typed by you..!
Labels:
Hacking Secrets Finally Revealed
Posted by
Pprasoon
at
21:16
0
comments
HOW TO BLOCK YOUR ENEMY'S SIM CARD
Here a simple trick for block your enemy sim card,Blocking a sim card is too simple.What you have to do is just enter the below code in the desired phone
**04*3814*7529*68243#
Entering of above code will ask you to enter the PUK code.To solve this issue just call customer care and get your PUK code.
Note:Entering of invalid PUK will cause permanent blocking of your SIM
Posted by
Pprasoon
at
21:10
0
comments
CounterMeasures for Virus and Worms attack
- Research projects
- Pranks
- Vandalism
- To attack the product of specifies companied
- To distribute the political messages
- Financial gain
- Identity theft
- Spyware
- Programs take longer to load than normal
- Computer's hard drive constantly runs out of free space
- Files have strange names which are not recognizable
- Resources are used up easily
Labels:
Hacking Secrets Finally Revealed
Posted by
Pprasoon
at
20:35
0
comments
CounterMeasures for PHISHING attack
- The Process involves
- Registering a fake domain name
- Building a look alike website
- Sending emails to many users
FACEBOOK PHISHING PAGE ::
Labels:
Hacking Secrets Finally Revealed
Posted by
Pprasoon
at
12:50
0
comments
CounterMeasures from being HACKED
- Switch to updated web browsers :: Try to work on updated browser like Firefox, Google Chrome or anything but be away from Internet Explorer :: add more security through web browser.
- Never click on links in email, almost ever :: Whenever possible try NOT to click on any links in email, especially since links are themselves are dangerous and phishing emails are difficult to spot.
- Changer your password :: Change your password every after 10 days of 15 days :: This will more good for you to be safe and try to keep strong password ::
- How to keep STRONG PASSWORD :: Try to use full keyboard means use alphabets, numbers and characters :: Use capital letters too :: for example P.r.#.a.S.O.$.o.n
- Use updated and strong ANTIVIRUS :: Try to use Strong and updated antivirus ::: Keep update every time :: If you do not have internet at home try to use that antivirus that provide updates (just search on GOOGLE)
- Norton antivirus (updates provided on net) :: Download => norton antivirus with serial key + crack
- AVG antivirus :: Download => AVG cracke +serial key
- Boot minder
- panda Active Scan
- Avast active scan :: Download => Avast internet security crack + serial key
- Spyware doctor :: Download => Spyware Doctor crack+ serial key
- USB security :: Use USB security software to be safe from virus, threats and usb hacking
Labels:
Hacking Secrets Finally Revealed
Posted by
Pprasoon
at
12:05
0
comments
How to read a person like a BOOK (cont'd)
Sunday, 5 June 2011
The understanding of gestures is very difficult when the various elements are separated from context. However, when gestures are fitted together into their composite positions, a complete picture evolves.
Every GESTURE is like a word in a language.
- Reading body language gives you insights into whether or not someone is telling the truth? True or False
- Since nonverbal communication is between 60 to 75% of the impact of a message, you could use the power of body language to become tremendously successful..
Posted by
Pprasoon
at
23:52
0
comments
How to read a person like a BOOK
For READING GESTURES :::: A man standing in the telephone booths. See the man standing with his body at attention. His coat is buttoned. He gives the impression that whoever he is talking with his to is very important to him. He might be salesman talking to a customer on the telephone as if he were actually in his presence..
If the MAN is relaxed, he slouches over, shifts his weight from foot to foot and rests his chin on his chest. He appears to be looking at the floor and nods his heads as is saying, "Haan Haan", "acha acha". Reading this person further, you get impression that he is comfortable but possible bored with conversion. THE RECEIVER OF THE CALL CAN BE TAKEN FOR GRANTED IT''S probably his wife or boring friend .
Posted by
Pprasoon
at
09:30
0
comments